Network and system security: 7th international conference, NSS 2013, Madrid, Spain, June 3 - 4, 2013 ; proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7873 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XIX, 793 S.) graph. Darst. |
ISBN: | 9783642386305 9783642386312 |
DOI: | 10.1007/978-3-642-38631-2 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV041402172 | ||
003 | DE-604 | ||
005 | 20140305 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 131107s2013 |||| o||u| ||||||eng d | ||
020 | |a 9783642386305 |9 978-3-642-38630-5 | ||
020 | |a 9783642386312 |c eISBN |9 978-3-642-38631-2 | ||
024 | 7 | |a 10.1007/978-3-642-38631-2 |2 doi | |
035 | |a (OCoLC)852532417 | ||
035 | |a (DE-599)BVBBV041402172 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 461f |2 stub | ||
245 | 1 | 0 | |a Network and system security |b 7th international conference, NSS 2013, Madrid, Spain, June 3 - 4, 2013 ; proceedings |c Javier Lopez ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XIX, 793 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7873 | |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Automatische Identifikation |0 (DE-588)4206098-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Schlüsselverteilung |0 (DE-588)4304682-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Madrid |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 3 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | 4 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 5 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 6 | |a Schlüsselverteilung |0 (DE-588)4304682-4 |D s |
689 | 0 | 7 | |a Automatische Identifikation |0 (DE-588)4206098-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Lopez, Javier |e Sonstige |4 oth | |
711 | 2 | |a NSS |n 7 |d 2013 |c Madrid |j Sonstige |0 (DE-588)1035142880 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 7873 |w (DE-604)BV014880109 |9 7873 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-38631-2 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026849671&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026849671&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-026849671 |
Datensatz im Suchindex
_version_ | 1804151508233617408 |
---|---|
adam_text | NETWORK AND SYSTEM SECURITY
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
STOCHASTIC TRAFFIC IDENTIFICATION FOR SECURITY MANAGEMENT: EDONKEY
PROTOCOL AS A CASE STUDY
A TECHNOLOGY INDEPENDENT SECURITY GATEWAY FOR REAL-TIME MULTIMEDIA
COMMUNICATION
EFFICIENT ATTRIBUTE BASED ACCESS CONTROL MECHANISM FOR VEHICULAR AD HOC
NETWORK
EVALUATION OF DETECTING MALICIOUS NODES USING BAYESIAN MODEL IN WIRELESS
INTRUSION DETECTION
MODEL THE INFLUENCE OF SYBIL NODES IN P2P BOTNETS
NETWORK SECURITY: SECURITY PROTOCOLS AND PRACTICE A NOVEL SECURITY
PROTOCOL FOR RESOLVING ADDRESSES IN THE LOCATION/ID SPLIT ARCHITECTURE
THE OFFPAD: REQUIREMENTS AND USAGE
INFORMATION-ORIENTED TRUSTWORTHINESS EVALUATION IN VEHICULAR AD-HOC
NETWORKS
USING TRUSTED PLATFORM MODULES FOR LOCATION ASSURANCE IN CLOUD
NETWORKING
NETWORK SECURITY: NETWORK ATTACKS AND DEFENSE TRACING SOURCES OF
ANONYMOUS SLOW SUSPICIOUS ACTIVITIES
STATIC ANALYSIS FOR REGULAR EXPRESSION DENIAL-OF-SERVICE ATTACKS
NEXT-GENERATION DOS AT THE HIGHER LAYERS: A STUDY OF SMTP FLOODING
TOWARDS HYBRID HONEYNETS VIA VIRTUAL MACHINE INTROSPECTION AND CLONING
SYSTEM SECURITY: MALWARE AND INTRUSIONS MADS: MALICIOUS ANDROID
APPLICATIONS DETECTION THROUGH STRING ANALYSIS
X-TIER: KERNEL MODULE INJECTION
LEVERAGING STRING KERNELS FOR MALWARE DETECTION
INSIDERS TRAPPED IN THE MIRROR REVEAL THEMSELVES IN SOCIAL MEDIA
SYSTEM SECURITY: APPLICATIONS SECURITY ON BUSINESS LOGIC VULNERABILITIES
HUNTING: THE APP LOGGIC FRAMEWORK
USING THE SMART CARD WEB SERVER IN SECURE BRANCHLESS BANKING
LIABILITY FOR DATA BREACHES: A PROPOSAL FOR A REVENUE-BASED SANCTIONING
APPROACH
EFFICIENT AND PRIVATE THREE-PARTY PUBLISH/SUBSCRIBE
SYSTEM SECURITY: SECURITY ALGORITHMS AND SYSTEMS MARLIN: A FINE GRAINED
RANDOMIZATION APPROACH TO DEFEND AGAINST ROP ATTACKS
MOBILE TRUSTED AGENT (MTA): BUILD USER-BASED TRUST FOR GENERAL-PURPOSE
COMPUTER PLATFORM
ANOMALY DETECTION FOR EPHEMERAL CLOUD IAAS VIRTUAL MACHINES
JSHADOBF: A JAVASCRIPT OBFUSCATOR BASED ON MULTI-OBJECTIVE OPTIMIZATION
ALGORITHMS
FORWARD SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME
LEAKAGE-RESILIENT ZERO-KNOWLEDGE PROOFS OF KNOWLEDGE FOR NP
ON THE SECURITY OF AN EFFICIENT ATTRIBUTE-BASED SIGNATURE
FACTORING RSA MODULUS WITH KNOWN BITS FROM BOTH P AND Q: A LATTICE
METHOD
PERFORMANCE PREDICTION MODEL FOR BLOCK CIPHERS ON GPU ARCHITECTURES
THRESHOLD-ORIENTED OPTIMISTIC FAIR EXCHANGE
SECURE STORAGE AND FUZZY QUERY OVER ENCRYPTED DATABASES
A HIGHLY EFFICIENT RFID DISTANCE BOUNDING PROTOCOL WITHOUT REAL-TIME PRF
EVALUATION
PRIVACY PRESERVING CONTEXT AWARE PUBLISH SUBSCRIBE SYSTEMS
A NEW UNPREDICTABILITY-BASED RFID PRIVACY MODEL
PRIVACY-PRESERVING MULTI-PARTY RECONCILIATION USING FULLY HOMOMORPHIC
ENCRYPTION
PRIVACY-PRESERVING PASSWORD-BASED AUTHENTICATED KEY EXCHANGE IN THE
THREE-PARTY SETTING
KEY AGREEMENT AND DISTRIBUTION LIGHT WEIGHT NETWORK CODING BASED KEY
DISTRIBUTION SCHEME FOR MANETS
IDENTITY-BASED DYNAMIC AUTHENTICATED GROUP KEY AGREEMENT PROTOCOL FOR
SPACE INFORMATION NETWORK
AUTHENTICATION AND KEY AGREEMENT BASED ON HYPER-SPHERE USING SMART CARDS
AN EFFICIENT CONSTANT ROUND ID-BASED GROUP KEY AGREEMENT PROTOCOL FOR AD
HOC NETWORKS
HUMAN IDENTIFICATION WITH ELECTROENCEPHALOGRAM (EEG) FOR THE FUTURE
NETWORK SECURITY
BUILDING BETTER UNSUPERVISED ANOMALY DETECTOR WITH S-TRANSFORM
FAULT-TOLERANT TOPOLOGY CONTROL BASED ON ARTIFICIAL IMMUNE IN WMNS
VIRTUALLY RECONFIGURABLE SECURE WIRELESS NETWORKS USING BROADCAST TOKENS
ON THE USE OF KEY ASSIGNMENT SCHEMES IN AUTHENTICATION PROTOCOLS
ON THE INTERACTIONS BETWEEN PRIVACY-PRESERVING, INCENTIVE, AND INFERENCE
MECHANISMS IN PARTICIPATORY SENSING SYSTEMS
SECURITY AUTHENTICATION OF AODV PROTOCOLS IN MANETS
ARCHITECTURE FOR TRAPPING TOLL FRAUD ATTACKS USING A VOIP HONEYNET
APPROACH
TOWARDS A PRIVACY-PRESERVING SOLUTION FOR OSNS
MEASURING AND COMPARING THE PROTECTION QUALITY IN DIFFERENT OPERATING
SYSTEMS
COLLUSION-RESISTANT DOMAIN-SPECIFIC PSEUDONYMOUS SIGNATURES
ON THE APPLICABILITY OF TIME-DRIVEN CACHE ATTACKS ON MOBILE DEVICES
ANCESTOR EXCLUDABLE HIERARCHICAL ID-BASED ENCRYPTION REVISITED
THINK TWICE BEFORE YOU SHARE: ANALYZING PRIVACY LEAKAGE UNDER PRIVACY
CONTROL IN ONLINE SOCIAL NETWORKS
A DYNAMIC AND MULTI-LAYER REPUTATION COMPUTATION MODEL FOR MULTI-HOP
WIRELESS NETWORKS
DISTRIBUTED AND ANONYMOUS PUBLISH-SUBSCRIBE
ENHANCING PASSIVE SIDE-CHANNEL ATTACK RESILIENCE THROUGH SCHEDULABILITY
ANALYSIS OF DATA-DEPENDENCY GRAPHS
COMBINING DYNAMIC PASSIVE ANALYSIS AND ACTIVE FINGERPRINTING FOR
EFFECTIVE BOT MALWARE DETECTION IN VIRTUALIZED ENVIRONMENTS
FILTERING TROLLING COMMENTS THROUGH COLLECTIVE CLASSIFICATION
SECURITY ANALYSIS OF TOUCH INPUTTED PASSWORDS: A PRELIMINARY STUDY BASED
ON THE RESISTANCE AGAINST BRUTE FORCE ATTACKS
A PAIRING-FREE IDENTITY BASED AUTHENTICATION FRAMEWORK FOR CLOUD
COMPUTING
FORMAL MODELING AND AUTOMATIC SECURITY ANALYSIS OF TWO-FACTOR AND
TWO-CHANNEL AUTHENTICATION PROTOCOLS
TOWARDS A MORE SECURE APACHE HADOOP HDFS INFRASTRUCTURE: ANATOMY OF A
TARGETED ADVANCED PERSISTENT THREAT AGAINST HDFS AND ANALYSIS OF TRUSTED
COMPUTING BASED COUNTERMEASURES
A FORMALLY VERIFIED INITIAL AUTHENTICATION AND KEY AGREEMENT PROTOCOL IN
HETEROGENEOUS ENVIRONMENTS USING CASPER/FDR
A COMPREHENSIVE ACCESS CONTROL SYSTEM FOR SCIENTIFIC APPLICATIONS
PARTIAL FINGERPRINT RECONSTRUCTION WITH IMPROVED SMOOTH EXTENSION
MODELING AND ANALYSIS FOR THWARTING WORM PROPAGATION IN EMAIL NETWORKS
ON SECURE AND POWER-EFFICIENT RFID-BASED WIRELESS BODY AREA NETWORK
TOWARDS AUTHENTICATED OBJECTS
A FINGER-VEIN BASED CANCELLABLE BIO-CRYPTOSYSTEM
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
NETWORK AND SYSTEM SECURITY
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE PROCEEDINGS OF THE 7TH INTERNATIONAL
CONFERENCE ON NETWORK AND SYSTEM SECURITY, NSS 2013, HELD IN MADRID,
SPAIN, IN JUNE 2013. THE 41 FULL PAPERS PRESENTED WERE CAREFULLY
REVIEWED AND SELECTED FROM 176 SUBMISSIONS. THE VOLUME ALSO INCLUDES 7
SHORT PAPERS AND 13 INDUSTRIAL TRACK PAPERS. THE PAPER ARE ORGANIZED IN
TOPICAL SECTIONS ON NETWORK SECURITY (INCLUDING: MODELING AND
EVALUATION; SECURITY PROTOCOLS AND PRACTICE; NETWORK ATTACKS AND
DEFENSE) AND SYSTEM SECURITY (INCLUDING: MALWARE AND INTRUSIONS;
APPLICATIONS SECURITY; SECURITY ALGORITHMS AND SYSTEMS; CRYPTOGRAPHIC
ALGORITHMS; PRIVACY; KEY AGREEMENT AND DISTRIBUTION)
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV041402172 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f DAT 050f DAT 000 DAT 461f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)852532417 (DE-599)BVBBV041402172 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-38631-2 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03164nmm a2200661 cb4500</leader><controlfield tag="001">BV041402172</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140305 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">131107s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642386305</subfield><subfield code="9">978-3-642-38630-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642386312</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-642-38631-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-38631-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)852532417</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041402172</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network and system security</subfield><subfield code="b">7th international conference, NSS 2013, Madrid, Spain, June 3 - 4, 2013 ; proceedings</subfield><subfield code="c">Javier Lopez ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIX, 793 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7873</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Automatische Identifikation</subfield><subfield code="0">(DE-588)4206098-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselverteilung</subfield><subfield code="0">(DE-588)4304682-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Madrid</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Schlüsselverteilung</subfield><subfield code="0">(DE-588)4304682-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Automatische Identifikation</subfield><subfield code="0">(DE-588)4206098-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lopez, Javier</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">NSS</subfield><subfield code="n">7</subfield><subfield code="d">2013</subfield><subfield code="c">Madrid</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1035142880</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7873</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">7873</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-38631-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026849671&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026849671&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026849671</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Madrid gnd-content |
genre_facet | Konferenzschrift 2013 Madrid |
id | DE-604.BV041402172 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:55:56Z |
institution | BVB |
institution_GND | (DE-588)1035142880 |
isbn | 9783642386305 9783642386312 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026849671 |
oclc_num | 852532417 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XIX, 793 S.) graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Network and system security 7th international conference, NSS 2013, Madrid, Spain, June 3 - 4, 2013 ; proceedings Javier Lopez ... (eds.) Berlin [u.a.] Springer 2013 1 Online-Ressource (XIX, 793 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 7873 Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf Automatische Identifikation (DE-588)4206098-9 gnd rswk-swf Schlüsselverteilung (DE-588)4304682-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Madrid gnd-content Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Sicherheitsprotokoll (DE-588)4709127-7 s Malware (DE-588)4687059-3 s Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Schlüsselverteilung (DE-588)4304682-4 s Automatische Identifikation (DE-588)4206098-9 s DE-604 Lopez, Javier Sonstige oth NSS 7 2013 Madrid Sonstige (DE-588)1035142880 oth Lecture notes in computer science 7873 (DE-604)BV014880109 7873 https://doi.org/10.1007/978-3-642-38631-2 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026849671&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026849671&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Network and system security 7th international conference, NSS 2013, Madrid, Spain, June 3 - 4, 2013 ; proceedings Lecture notes in computer science Sicherheitsprotokoll (DE-588)4709127-7 gnd Kryptoanalyse (DE-588)4830502-9 gnd Malware (DE-588)4687059-3 gnd Automatische Identifikation (DE-588)4206098-9 gnd Schlüsselverteilung (DE-588)4304682-4 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd |
subject_GND | (DE-588)4709127-7 (DE-588)4830502-9 (DE-588)4687059-3 (DE-588)4206098-9 (DE-588)4304682-4 (DE-588)4274324-2 (DE-588)4070085-9 (DE-588)4209132-9 (DE-588)1071861417 |
title | Network and system security 7th international conference, NSS 2013, Madrid, Spain, June 3 - 4, 2013 ; proceedings |
title_auth | Network and system security 7th international conference, NSS 2013, Madrid, Spain, June 3 - 4, 2013 ; proceedings |
title_exact_search | Network and system security 7th international conference, NSS 2013, Madrid, Spain, June 3 - 4, 2013 ; proceedings |
title_full | Network and system security 7th international conference, NSS 2013, Madrid, Spain, June 3 - 4, 2013 ; proceedings Javier Lopez ... (eds.) |
title_fullStr | Network and system security 7th international conference, NSS 2013, Madrid, Spain, June 3 - 4, 2013 ; proceedings Javier Lopez ... (eds.) |
title_full_unstemmed | Network and system security 7th international conference, NSS 2013, Madrid, Spain, June 3 - 4, 2013 ; proceedings Javier Lopez ... (eds.) |
title_short | Network and system security |
title_sort | network and system security 7th international conference nss 2013 madrid spain june 3 4 2013 proceedings |
title_sub | 7th international conference, NSS 2013, Madrid, Spain, June 3 - 4, 2013 ; proceedings |
topic | Sicherheitsprotokoll (DE-588)4709127-7 gnd Kryptoanalyse (DE-588)4830502-9 gnd Malware (DE-588)4687059-3 gnd Automatische Identifikation (DE-588)4206098-9 gnd Schlüsselverteilung (DE-588)4304682-4 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd |
topic_facet | Sicherheitsprotokoll Kryptoanalyse Malware Automatische Identifikation Schlüsselverteilung Computersicherheit Rechnernetz Kryptosystem Konferenzschrift 2013 Madrid |
url | https://doi.org/10.1007/978-3-642-38631-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026849671&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026849671&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT lopezjavier networkandsystemsecurity7thinternationalconferencenss2013madridspainjune342013proceedings AT nssmadrid networkandsystemsecurity7thinternationalconferencenss2013madridspainjune342013proceedings |